Sciweavers

1663 search results - page 88 / 333
» Computer Security in the Real World
Sort
View
INFOCOM
2005
IEEE
14 years 2 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...
JNW
2008
99views more  JNW 2008»
13 years 9 months ago
Probabilistic Key Management Practical Concerns in Wireless Sensor Networks
The subject of Key Management in Wireless Sensor Networks has gained increased attention from the security community around the world in the last years. Several proposals were made...
Rui Miguel Soares Silva, Nuno Sidónio A. Pe...
FOCI
2007
IEEE
14 years 24 days ago
Type-2 Fuzzy Sets: Geometric Defuzzification and Type-Reduction
This paper presents the geometric defuzzifier for generalised type-2 fuzzy sets. This defuzzifier can be executed in real-time and can therefore be applied to control and other rea...
Simon Coupland
FLAIRS
1998
13 years 10 months ago
Strategic Evaluation in Complex Domains
In somecomplexdomains,like the gameof Go,evaluating a position is not simple. In other games,like Chessfor example,material balancegives goodandfast to compute insight onthe value...
Tristan Cazenave
PERCOM
2003
ACM
14 years 8 months ago
Mobile Link Services with MQSeries Everyplace
The Open Hypermedia model is based upon the separation of hypertext links from documents and treats them as separate entities. Distributed link services take this approach and imp...
Sanjay Vivek, Kenneth Tso, David De Roure